A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards More Efficient Cardinality Estimation for Large-Scale RFID Systems
2014
IEEE/ACM Transactions on Networking
Radio frequency identification (RFID) cardinality estimation with an accuracy guarantee is of practical importance in various large-scale RFID applications. ...
This paper proposes a fast RFID cardinality estimation protocol, named Zero-One Estimator (ZOE). ZOE only requires 1-bit response from the RFID tags per estimation round. ...
We implement a prototype system based on the GNU-Radio/USRP platform in concert with the WISP RFID tags. ZOE only requires slight updates to the EPCglobal C1G2 standard. ...
doi:10.1109/tnet.2013.2288352
fatcat:ebomufw4pbfednc6kkdfqo3mue
ZOE: Fast cardinality estimation for large-scale RFID systems
2013
2013 Proceedings IEEE INFOCOM
Estimating the RFID cardinality with accuracy guarantee is an important task in large-scale RFID systems. This paper proposes a fast RFID cardinality estimation scheme. ...
We implement a prototype system using the USRP software defined radio and Intel WISP RFID tags. We also evaluate the performance of ZOE with extensive simulations. ...
A large-scale RFID system usually consists of multiple RFID readers and a huge amount of RFID tags [23] . ...
doi:10.1109/infcom.2013.6566879
dblp:conf/infocom/ZhengL13
fatcat:rlkrxphgebhlhihvra5mopn2x4
Fast Tracking the Population of Key Tags in Large-Scale Anonymous RFID Systems
2016
IEEE/ACM Transactions on Networking
In large-scale RFID-enabled applications, we sometimes only pay attention to a small set of key tags, instead of all. ...
To obtain good scalability in large-scale RFID systems, we exploit the sampling idea in the estimation process. ...
In a large-scale RFID system containing thousands of tags, we may only care about a small subset of tags instead of all tags. ...
doi:10.1109/tnet.2016.2576904
fatcat:nvqushwgzrhbzcke65tf46rkwm
Clone tag detection in distributed RFID systems
2018
PLoS ONE
To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. ...
A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. ...
Acknowledgments This work is sponsored by Universiti Tun Hussein Onn Malaysia under Multidisciplinary Research (MDR) Grant vote U095 and the Ministry of Education through SLAI scholarship. ...
doi:10.1371/journal.pone.0193951
pmid:29565982
pmcid:PMC5863942
fatcat:xwx4zicanrgtngl3r7vqd3egsu
2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25
2015
IEEE Transactions on Parallel and Distributed Systems
Ferretti, Luca, +, TPDS Feb. 2014 437-446
Databases
Efficient Unknown Tag Identification Protocols in Large-Scale RFID Sys-
tems. ...
., +, TPDS April 2014 1078-1088 Meta data A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks. ...
Goods distribution OTrack: Towards Order Tracking for Tags in Mobile RFID Systems. ...
doi:10.1109/tpds.2014.2371591
fatcat:qxyljogalrbfficryqjowgv3je
An efficient tag search protocol in large-scale RFID systems
2013
2013 Proceedings IEEE INFOCOM
One research issue of practical importance is to search for a particular group of tags in a large-scale RFID system. ...
Based on this technique, we propose an iterative tag search protocol. ...
A FAST TAG SEARCH PROTOCOL BASED ON FILTERING VECTORS In this section, we propose an Iterative Tag Search Protocol (ITSP) to solve the tag search problem in large-scale RFID systems.
A. ...
doi:10.1109/infcom.2013.6566878
dblp:conf/infocom/ChenLMCF13
fatcat:z3pbrcwekzgk3errjvga3qeatu
An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel
2016
IEEE/ACM Transactions on Networking
One research issue of practical importance is to search for a particular group of tags in a large-scale RFID system. ...
Based on this technique, we propose an iterative tag search protocol. ...
FAST TAG SEARCH PROTOCOL BASED ON FILTERING VECTORS In this section, we propose an Iterative Tag Search Protocol (ITSP) to solve the tag search problem in large-scale RFID systems. ...
doi:10.1109/tnet.2014.2386318
fatcat:kgonda2hkvfkxdplhuxabfavoy
Identification-free batch authentication for RFID tags
2010
The 18th IEEE International Conference on Network Protocols
Cardinality estimation and tag authentication are two major issues in large-scale Radio Frequency Identification (RFID) systems. ...
For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, incurring large volume of authentication data and huge communication cost. ...
This work is supported in part by National Natural Science Foundation of China ...
doi:10.1109/icnp.2010.5762764
dblp:conf/icnp/YangHQL10
fatcat:q2fco7bvnvanjbzlyo6i72cokm
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
2017
Security and Communication Networks
The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy. ...
(CAIP) to identify all cloned tags in multireaders RFID systems. ...
The results show that CAIP can identify all cloned tags in large-scale RFID systems fairly fast with required accuracy. ...
doi:10.1155/2017/8356983
fatcat:rmsd26vl4bbpfkhrodqbde2hfm
Informative counting
2013
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '13
Deterministic approaches verify tags one by one, and the communication overhead and time cost grow linearly with increasing size of tags. ...
We design a fine-grained batch authentication scheme, INformative Counting (INC), which achieves sublinear authentication time and communication cost in batch verifications. ...
This work is supported in part by the NSFC Young Scholar 61103187, National Basic Research Program of China (973) Grant No. 2011CB302705, NSFC Major Program 61190110 and the NSFC under Grant 61171067. ...
doi:10.1145/2491288.2491299
dblp:conf/mobihoc/GongLMMYL13
fatcat:5iynwdcd2nablhadw4nkq2xmga
Special issue on multimedia in technology enhanced learning
2016
Journal of Intelligent & Fuzzy Systems
Increased networking in different scales from global to local is having a profound effect on learning and teaching. ...
systems to the maximum extent possible. ...
Existing RFID localization approaches rely on signal strength to measure the distance between RFID reader and tags. ...
doi:10.3233/jifs-169086
fatcat:ssq3bs5rdjcsrjh522qda4jijq
Managing RFID Data: Challenges, Opportunities and Solutions
2014
IEEE Communications Surveys and Tutorials
It becomes a great challenge in the information era to effectively understand human behavior, mobility and activity through the perceived RFID data. ...
Focusing on RFID data management, this article provides an overview of current challenges, emerging opportunities and recent progresses in RFID. ...
Based on the above idea, Kodialam et al. propose a fast and reliable estimation mechanisms for tag size in a practical approach [25] . ...
doi:10.1109/surv.2014.022614.00143
fatcat:dmqiy5uutne53iqljc5pgobd6i
A survey of RFID privacy approaches
2008
Personal and Ubiquitous Computing
A bewildering number of proposals have offered solutions to the privacy problems inherent in RFID communication. ...
This article tries to give an overview of the currently discussed approaches and their attributes. ...
Acknowledgments The feedback of the anonymous reviewers, as well as the many helpful comments from my co-editor Sarah Spiekermann, helped tremendously in the writing of this article. ...
doi:10.1007/s00779-008-0213-4
fatcat:6eqyljuqczdivl6cucnjjazmna
Top-k queries for multi-category RFID systems
2016
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications
In this paper, we propose a Top-k Query (TKQ) protocol and a technique that we call Segmented Perfect Hashing (SPH) for optimizing TKQ. ...
Specifically, TKQ is based on the framed slotted Aloha protocol. Each tag responds to the reader with a Single-One Geometric (SOG) string using the ON-OFF Keying modulation. ...
Similarly, Zheng et al. proposed the PET protocol for tree-based RFID systems [10] . ...
doi:10.1109/infocom.2016.7524576
dblp:conf/infocom/LiuLWLXZX16
fatcat:r5uo6swmrjbvbnpfrkbxs6qype
Tag Estimation Method for ALOHA RFID System Based on Machine Learning Classifiers
2022
Electronics
The work presented in this paper provides a use-case feasibility analysis of the implementation of ML algorithms for the estimation of ALOHA-based frame size in the RIFD Gen2 system. ...
In the last two decades, Radio Frequency Identification (RFID) technology has attained prominent performance improvement and has been recognized as one of the key enablers of the Internet of Things (IoT ...
In large-scale infrastructures, such as commercial warehouses, reading RFID tags, such as ultra-highfrequency ones, comes at a high cost and can involve a large volume of data [2] . ...
doi:10.3390/electronics11162605
fatcat:q7in7hvzrzbffhtjo7pg7e55ba
« Previous
Showing results 1 — 15 out of 625 results